Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Sam ScottCornell TechVerified email at cornell.edu
Thyla van der MerweRoyal Holloway, University of LondonVerified email at live.rhul.ac.uk
Jonathan HoylandRoyal HollowayVerified email at live.rhul.ac.uk
Jyotirmoy V. DeshmukhAssociate Professor, University of Southern CaliforniaVerified email at usc.edu
Rupak MajumdarMPI for Software SystemsVerified email at mpi-sws.org
Xiaoqing JinApple Inc.Verified email at cs.ucr.edu
Vinayak S. PrabhuColorado State UniversityVerified email at colostate.edu
Zvonko IljazovićDepartment of Mathematics, Faculty of Science, University of ZagrebVerified email at math.pmf.unizg.hr
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Bojan PažekScientific Associate, Rudolfovo - Science and Technology Center Novo mesto, SloveniaVerified email at rudolfovo.eu
Vedran ČačićDepartment of Mathematics, Faculty of Science, University of ZagrebVerified email at math.pmf.unizg.hr
Petar ParadžikUniversity of Zagreb Faculty of Electrical Engineering and ComputingVerified email at fer.unizg.hr
Ante DerekAssociate Professor, University of Zagreb Faculty of Electrical Engineering and ComputingVerified email at fer.unizg.hr
Follow![Marko Horvat](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=khj6eu8AAAAJ&citpid=1)
Marko Horvat
Department of Mathematics, Faculty of Science, University of Zagreb
Verified email at math.pmf.unizg.hr